On Wed, 24 Jan 2001, Some Guy wrote:
> Making encryption easy violates the clique.
That's a rather narrow viewpoint. There are always trade-offs involved in
selecting features:
1. Code-bloat is a bane. Have you ever used all the features of
MS Office? No? Well, you still have me
So when the computer is on the login screen asking for your username, password, and
domain you can log on then just like normall, and enter a username and pass and logon?
Also, if a computer is setup this way, and you install on one username, then you goto
connect to it and the computer is logge
Hi,
since there are abviously some poeple good at security on this list, I'd
like to ask, if they could point me to some good literature (preferred
online), about implementing security methods, or more specific, user
authentication.
Since we are in the process of developing a completely new
Goods
What OS are you running? NT4/2000 I assume? With either of those you'll want
to install VNC Service. With the service installed, you can access the
system remotely whether a user is logged in or not. In all my use with VNC,
I've always installed the service, started it, input the password then
ins
Sorry if this post has been asked a thousand time. I searched and didn't
find. My client logs in fine, but dies immediately when the mouse is moved.
I have 2000 professional machines on both ends. The server is behind an
etherfast cable/dsl router with built in firewall. I enable the port on the
s
I have been trying to get this to work and have not been having much luck.
I would like to be able to VNC directly into any machine on my private
network through Windows 2000 ICS using the services mapping. I also want to
be able to VNC to the ICS machine from both inside and outside the private
> What is the diffrence between making VNC a service that in in the Admin
> settings, and making it a scheduled task that starts every time the
computer
> logs onto windows?
When I started WinVNC in application mode (when I logged onto Windows NT), I
could connect only as long as the computer was
> Yep, they all have the same network cards. We haven't tried that. I will
> swap mine out for a 3Com or something high-end and see what I get when
> VNCing in. I was led to believe it was a video driver issue.
It's the fact that it works for a little while that suggests a network
issue. If i
> >Also, I have tried the Java viewer (most people here use the Java viewer
> >actually). It dithers down to 8-bit automatically so you can usually
work a
> >bit longer, but it will eventually lock up and BSOD like the standalone
> >viewer. Yesterday I BSOD'd about 4 times in a row because of th
Anyhow, I imagine a good strategy
> would be to steal from the best and hijack some OpenSSH/SSLeay code,
> rather
> than writing some new thing that may or may not "really" be secure.
> I think that at least initially, wrapping the existing protocol is the
> way to go, rather than inventing a new
On Thu, Jan 25, 2001 at 01:36:18PM +0100, [EMAIL PROTECTED] wrote:
> What about this... Assuming I got it right, using VNC with SSH gives
> very good security. The development of SSH is continously going
> on. One could make VNC profit of this. So for UNIX it would be
> sufficient to have some fu
>TridiaVNC is about 9 MB...it takes FOREVER to download at 28.8k. If I need
>access to a remote client's system in a hurry, I want them to have the
>smallest possible download, so I'm all in favor of leaving larger and more
>complex features as patches, plug-ins, or whatever.
I've noticed this as
>Anyhow, I imagine a good strategy
>> would be to steal from the best and hijack some OpenSSH/SSLeay code,
>> rather
>> than writing some new thing that may or may not "really" be secure.
>> I think that at least initially, wrapping the existing protocol is the
>> way to go, rather than inventing
> You can't do this. That's kind of the point about SSH tunnels. If
> you could set them up automatically, they would be completely
> ineffective at authentication.
>
> Tim.
But these are two different things. Authentication is one thing. But
encrypting network traffic the other. I have no dee
>> What about this... Assuming I got it right, using VNC with SSH gives
>> very good security. The development of SSH is continously going
>> on. One could make VNC profit of this. So for UNIX it would be
>> sufficient to have some functionality that makes setting up SSH
>> tunnels transparent to
>The problem is Windows where one probably has
>no SSH (especially the daemon)at hand so easily.
This is not really true any longer. I have been using the OpenSSH piece of
the Cygwin project (www.cygwin.com) to tunnel between two of my Win98
machines for the last several weeks. Both client (in
Greetings.
I would like to know if it's possible to use Xvnc under linux as a
replacement for XFree86 on a Red Hat 7.0 system. I've read the discussions
about x0rfb and I'd rather just disable X on the console and run it through
VNC on my windows box instead.
Is this possible, and would it look
Jonathan,
> Re: Stream encryption - is it time?
>
> From: Jonathan Morton ([EMAIL PROTECTED])
> Date: Thu Jan 25 2001 - 01:49:22 GMT
>
>
>
> >I want to stir up a discussion, but I think the specifics of development
> >might be better taken elsewhere. Any developers out there want to help m
> >The problem is Windows where one probably has
> >no SSH (especially the daemon)at hand so easily.
>
> This is not really true any longer. I have been using the OpenSSH piece
> of
> the Cygwin project (www.cygwin.com) to tunnel between two of my Win98
> machines for the last several weeks. B
How can I make VNC run as an invisible service?
-
To unsubscribe, send a message with the line: unsubscribe vnc-list
to [EMAIL PROTECTED]
See also: http://www.uk.research.att.com/vnc/intouch.html
--
> if we had SSH on all needed platforms (maybe Macintosh is problem)
SSH2 is available for Mac. (and I think there is some SSH capability
bundled with OS X.)
I've tunnelled VNC through SSH quite successfully on my Macs (although
rather slow - the main Macs I use are quite old) with the Macs as
c
On Thu, Jan 25, 2001 at 03:19:44AM -0800, Seran O'Morrigan wrote:
> Is this possible, and would it look exactly the same as XFree? I've seen a
> few people say that they have gotten the gnome login manager thing working
> properly, but nobody's mentioned really how to do it. Any help would be
> g
The same thing happened to me (NT4 and Win2K systems). I had to
uninstall/reinstall to get the password to change. Or I changed the
password through the VNC GUI, then went into RegEdt32, copied the content
and pasted it into the remote machine Registries.
-Original Message-
From: Mich
As I posted some months ago, I've had great success using Zebedee as a
secure tunnel (http://www.winton.org.uk/zebedee). I initially tried using
SSH from cygwin, but I never did get it to work - it consistently hung on my
Win95 box, no matter what version of SSH or what version of the Cygwin DLL.
> How can I make VNC run as an invisible service?
What do you mean? What platform are you using? What version of VNC are
you using? Have you read the documentation?
If you are asking if you can run VNC without the tray icon in Windows,
please read the FAQ.
Dan Fulbright
-
Wow... my monitor is going crazy, flashing like a mad man...
In between flickers, it says "According to /var/run/gdm.pid, gdm was already
running (27444), but seems to have been murdered mysteriously." and my
screen is filling up with them...
Just a guess, but might I also have to edit /etc/X11/
>From the words you used, I'm going to assume that you mean under NT. There
really isn't an easy way. You could do a number of things, though... rename
the WinVNC executable. Then rename the service entries in the registry so
that it shows up under a different name in the Services Control Panel
I am using Win98se.In the FAQ is only a topic of a problem: I don't see a
taskbar Icon.
It does not describe how to make it invisible.
Rene de Kat
-Oorspronkelijk bericht-
Van: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]Namens Dan Fulbright
Verzonden: donderdag 25 januari 2001 16:26
Aan
On Thu, Jan 25, 2001 at 07:32:22AM -0800, Seran O'Morrigan wrote:
> Just a guess, but might I also have to edit /etc/X11/gdm/gdm.conf and change
> the 0: line in there, as well?
If you're using gdm it's entirely different, yes.
> Any ideas?
No, sorry. I don't use gdm.
Tim.
*/
[demime 0.97b
Glenn Mabbutt wrote:
>
> As I posted some months ago, I've had great success using Zebedee as a
> secure tunnel (http://www.winton.org.uk/zebedee). I initially tried using
> SSH from cygwin, but I never did get it to work - it consistently hung on my
> Win95 box, no matter what version of SSH or
At 02:40 PM 1/25/2001 +, you wrote:
> > if we had SSH on all needed platforms (maybe Macintosh is problem)
>
>SSH2 is available for Mac. (and I think there is some SSH capability
>bundled with OS X.)
These is. I've done SSH from command prompt on the OS X beta right out of
the box. Work
Hi everyone,
I have a strange problem with key mapping. Hopefully someone knows how to
solve it.
I'm using VNC 3.3.2 on Linux (Mandrake 7.1) running on a dual P3 Xeon
machine (XF86 is 4.0.1). We connect to it from our NT boxes via our
corporate network. We usually connect with the iXvnc so pe
> You can't do this. That's kind of the point about SSH tunnels. If
> you could set them up automatically, they would be completely
> ineffective at authentication.
I might have misunderstood, I don't use SSH very much, but from an
encryption-only standpoint (Using VNC's own authenticatio
Some of us receive this list as a digest. Makes it difficult to follow your
prescription;>) No one has suggested eliminating the mailing list, why all
the agida about offering people a choice?
Mike Carillon wrote:
>Would you or someone else please explain to me why you need to filter out
>message
Perhaps a new branch for remote control software from comp.dcom or
comp.software might be appropriate, but since Mark is doing the grunt work
I'm more than willing to defer to his decision;>)
Ben Prescott wrote:
>I couldn't find comp.sys.software on deja, though; I assume this would
>start a new
I agree that this approach is preferable. You may want to keep in mind
that any restrictions on posting content, i.e. commercial advertisements,
must be made in the original charter, as there is no official way to modify
a charter once a group has been approved and created. I found this out the
On Thu, Jan 25, 2001 at 09:44:40AM -0700, Dave Warren wrote:
> I might have misunderstood, I don't use SSH very much, but from an
> encryption-only standpoint (Using VNC's own authentication, which would go
> through the SSH tunnel too, so we don't have to worry about the security
> problems rece
> "JAK" == Joseph A Knapka <[EMAIL PROTECTED]> writes:
JAK> BTW, I think there's already an Xvnc (maybe Const's?) that
JAK> can automatically set up SSH tunnels.
Yes, -tunnel option is available in modified versions of Unix
vncviewer. It's supported in the TridiaVNC distribution and
Anybody else know anything about gdm and Xvnc?
Cheers!
#Seran O'Morrigan
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Tim Waugh
> Sent: Thursday, January 25, 2001 07:43
> To: [EMAIL PROTECTED]
> Subject: Re: Xvnc as a replacement X Server
>
>
> I am using Win98se.In the FAQ is only a topic of a problem: I don't see a
> taskbar Icon.
> It does not describe how to make it invisible.
This is FAQ # 45. http://www.uk.research.att.com/vnc/faq.html#q45
Dan Fulbright
-
To u
>> You can't do this. That's kind of the point about SSH tunnels. If
>> you could set them up automatically, they would be completely
>> ineffective at authentication.
>
>
>
>I might have misunderstood, I don't use SSH very much, but from an
>encryption-only standpoint (Using VNC's own authe
We have been using vnc, for some time, to allow windows users access to
linux machines. Problem is that the linux users start Xvnc use it once,
maybe twice, then forget to terminate the program. Then a few days
latter they start up another Xvnc on another machine. You can see my
problem (I hav
So, I see that my suggestion has drawn up quite a lot of discussion. Let
me further my list of goals, and the suggested "requirements" of my
direction:
1) Adding encryption should add negligible size (of executable) and speed
(of encoding, in CPU use) costs to VNC.
2) Encryption should be "thin",
Carl,
Do you by chance remember what you had to do to get rid of the gray screen
and get the Xwindows screen to show up on Windows?
Thanks,
Joey
-Original Message-
From: Carl Strebel [mailto:[EMAIL PROTECTED]]
Sent: Thursday, January 25, 2001 12:23 PM
To: [EMAIL PROTECTED]
Subject: Usi
Jonathan Morton wrote:
>
> >> You can't do this. That's kind of the point about SSH tunnels. If
> >> you could set them up automatically, they would be completely
> >> ineffective at authentication.
> >
> >
> >
> >I might have misunderstood, I don't use SSH very much, but from an
> >encrypt
By the way, if anyone wants to develop for PocketPC (CE 3.0) or CE 2.12
devices, but thought the tools were too expensive, check out:
http://www.microsoft.com/windows/embedded/ce/tools/emvt30order.asp
The tools are free, but they charge $7.50 for shipping. You get CE
versions of Visual C and Vi
Hi,
I'm using the latest version of VNC on a pc running win98SE.
The pc has ICS (Internet Connection Sharing) enabled and the pc
is multihomed. VNC is running and when I hover the mouse over
the icon it shows both addresses (public and private) I am able
to connect to the vnc server on the publ
Is this just the 30-day trial version, or the real package?
Are there any catches like upgrade requirements?
Also, can it generate binaries for any WinCE platform
(specifically, I'm interested in SH (Hitachi SuperH))?
Thanks,
-- Joe
Mac Reiter wrote:
>
> By the way, if anyone wants to develop
Full package, no licensing trickiness, generate and sell commercial apps if
you want to, and it supports ARM, MIPS, SH3, and SH4. The ONLY problem is
that is does not support devices prior to 2.12 (although I strongly suspect
that 2.11 devices would still work, I have not verified this yet).
Mac
The installation section of the VNC guide refers to an advanced setting for
AuthHosts. This setting is suppose to be in the
HKEY_LOCAL_MACHINES\Software\ORL\WINVNC3\ registry branch.
I am unable to find AuthHosts anywhere in the Registry.
I'm running vnc v3.3.3r7 on a nt4.0 box with SP6a
Any h
> The installation section of the VNC guide refers to an advanced setting
> for
> AuthHosts. This setting is suppose to be in the
> HKEY_LOCAL_MACHINES\Software\ORL\WINVNC3\ registry branch.
>
> I am unable to find AuthHosts anywhere in the Registry.
If it does not exist, create the entry. The
I can't help with gnome either.
I run three non-console vnc servers, using /etc/rc.d/init.d script I found
in the mailing list archives. If you want to implement this, dig through
the archive for june 2000 ...
Re: Autostarting vncserver non-root (was RE: help)
Date: Wed Jun 21 2
Autostart the vnc server at boot time? See my other post!
At 11:44 25/01/01 -0500, you wrote:
>Hi everyone,
>
>I have a strange problem with key mapping. Hopefully someone knows how to
>solve it.
>
>I'm using VNC 3.3.2 on Linux (Mandrake 7.1) running on a dual P3 Xeon
>machine (XF86 is 4.0.1).
Greetings. I'm using iXvnc + vncviewer as X terminal.
On Thu, Jan 25, 2001 at 03:22:52PM -0500, Carl Strebel wrote:
> I saw in the documentation the -inetd option. Followed the
> documentation set forth in:
> http://www.dei.isep.ipp.pt/~andre/extern/ixvnc.htm
> I've also tried to follow the dir
>> >> You can't do this. That's kind of the point about SSH tunnels. If
>> >> you could set them up automatically, they would be completely
>> >> ineffective at authentication.
>> >
>> >
>> >
>> >I might have misunderstood, I don't use SSH very much, but from an
>> >encryption-only standpoin
Mac - I think this would be a WONDERFUL idea. I don't have a clue about
programming in C++, mainly a vb hack at best. Please get involved in the
microsoft.public.pocketpc.developer forum. There would be tons of people
over there that would be willing to assist in one form or another, including
Jonathan Morton wrote:
>
> >> >> You can't do this. That's kind of the point about SSH tunnels. If
> >> >> you could set them up automatically, they would be completely
> >> >> ineffective at authentication.
> >> >
> >> >
> >> >
> >> >I might have misunderstood, I don't use SSH very much, b
>> >SSH does its level best never to transmit any data in the clear.
>> >Even the initial authentication exchange is encrypted. The attack
>> >against VNC hinges on the fact that the server transmits the
>> >challenge string in the clear, which gives the man in the middle
>> >some data he can chan
Jonathan Morton wrote:
> combination that happens to be running a browser? Does his network admin
> require him to carry a floppy disk containing the server's encryption key,
> or does he risk having the key sniffed by one of these MITM attacks (and
> this one doesn't require modification of the
59 matches
Mail list logo